/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
Company

@lilyhnewman

Filtered to controversy pattern ×
15 articles stable

@lilyhnewman has appeared in 15 articles since 2017-07. Coverage peaked in 2020Q2 with 3 articles. Frequently mentioned alongside Lily Hay Newman / @lilyhnewman, Lily Hay Newman, Facebook, Lily Hay Newman / Wired.

Articles
15
mentions
Velocity
0.0%
growth rate
Acceleration
+0.500
velocity change
Sources
2
publications

Coverage Timeline

2022-11-05
Wired

A look at the Rust programming language after 12 years, evolving from side project to robust ecosystem, as developers praise its security, ease, and performance

Rust makes it impossible to introduce some of the most common security vulnerabilities.  And its adoption can't come soon enough. Tweets: @nathanielmott Tweets: Nathaniel Mott / @nathanielmott : You s...

2021-05-30
Wired

Google researchers detail “Half-Double”, a new Rowhammer attack technique they say will be difficult to mitigate as future generations of DRAM chips get smaller

A full fix for the “Half-Double” technique will require rethinking how memory semiconductors are designed. Tweets: @ucsdjacobs , @gadgetlab , and @wired Tweets: UCSD Engineering / @ucsdjacobs : As chi...

2021-03-21
Wired

A look at Facebook's “Red Team X”, an internal hacking team founded in 2020, which probes 3rd-party tech Facebook uses for hardware and software vulnerabilities

Lily Hay Newman / Wired : Tweets: @johnjhacking , @gadgetlab , @lilyhnewman , and @ajxchapman Tweets: John Jackson / @johnjhacking : Jealous. This is what I need to be doing for a living. https://www...

2021-03-20
Wired

A look at Facebook's “Red Team X”, an internal hacking team founded in 2020, which probes 3rd-party tech Facebook uses for hardware and software vulnerabilities

The internal hacking team has spent the last year looking for vulnerabilities in the products the company uses … Tweets: @johnjhacking , @gadgetlab , @lilyhnewman , and @jenmartinez Tweets: John Jacks...

2020-10-26
Wired

Profile of Maddie Stone, who leads Google's Project Zero team that studies and neuters actively exploited Android malware

The Project Zero reverse engineer shuts down some of the world's most dangerous exploits—along with antiquated hacker stereotypes.  —  EVEN WITH A knee injury, Maddie Stone is formidable. Tweets: @how...

2020-08-06
Wired

Election tech giant ES&S and security firm Synack partner to let security professionals, vetted by Synack, conduct penetration testing on some ES&S products

Lily Hay Newman / Wired : Tweets: @synack , @weems , @lilyhnewman , and @caseyjohnellis Tweets: @synack : “By throwing [@essvote's new model of electronic poll book] to the wolves, ES&S can learn abo...

2020-05-24
Wired

Researchers discuss ShinyHunters, a hacking group that is hawking what it claims is ~200M stolen records on the dark web since May 1 from at least 13 companies

Lily Hay Newman / Wired : Tweets: @teachemtechy and @lilyhnewman Tweets: Techy / @teachemtechy : I was featured giving some commentary on ShinyHunters, who is following a similar playbook to gnosticp...

2020-04-04
The Intercept 30 related

Researchers: Zoom sometimes uses encryption keys issued by servers in China, uses a flawed encryption method, and hence is not suited to communicate secrets

but it can be fixed Stephen Warwick / iMore : Today on Zoom: ‘Not suited for secrets’, encryption issues and more Mercury News : Zoombombing: FBI warns video calls are getting hijacked Tweets: Glenn F...

2019-02-13
Wired

Amber Authenticate is a new tool built on Ethereum that generates hashes of a video and records them on a public blockchain to protect it from deepfakes

VIDEO HAS BECOME an increasingly crucial tool for law enforcement, whether it comes from security cameras, police-worn body cameras, a bystander's smartphone, or another source. Tweets: @laurengoode T...

2018-09-27
Wired

Study shows 3,695 of Alexa's top 100,000 sites in mobile browsers access motion and light sensor data without asking user permission

Lily Hay Newman / Wired : Tweets: @lilyhnewman and @chumunculus Tweets: Lily Hay Newman / @lilyhnewman : there's no uniform system for requiring web apps to ask permission before accessing a slew of ...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...